Presentation on theme: "Sept. 20141 Welcome to the Course of Web and Document Databases (7102-001)"— Presentation transcript:
Sept. 20141 Welcome to the Course of Web and Document Databases (7102-001)
Sept. 20142 Name: Yangjun Chen Birthplace: China P.h..D: University of Kaiserslautern, Germany, in 1995 Post Doctor: University of Chemnitz, Germany, 1995/7 - 1997/8 Senior engineer: Germany Research Center for Information Technology, 1997/9 - 2000/2 Post Doctor.: University of Alberta, 2000/2 - 2000/6 Assistant Prof.: University of Winnipeg, 2000/7 – 2004/6 Associate Prof.: University of Winnipeg, 2004/7 – 2009/6 Full Prof.: University of Winnipeg, from 2009/7
Sept. 20143 Professor: Dr. Y. Chen Office: 3D27 home-page: http://www.uwinnipeg.ca/~ychen2 http://www.uwinnipeg.ca/~ychen2 E-mail: email@example.com phone: 786-9417 Meeting time: 11:30 – 12:45 pm, Monday and Wednesday Meeting location: 3D03 Office hours:15:00 - 16:30 Monday and Wednesday 10:00 – 17:00 Friday
Sept. 20144 Course Outline Intro. to the design of Web and document databases, analysis, and applications Introduction to relational database theory Basic methods for designing relational databases, Normalization theory, B+-tree, Hashing, R-tree. XML documents Semistructured-Data Model, Programming languages for XML, Databases and Internet. Evaluation of tree pattern queries Tree searching and graph searching, unordered tree matching, ordered tree matching, XB-tree. Reachability query evaluation transitive closure, reachability checking, matrix multiplication, tree encoding, graph deduction and decomposition
Sept. 20145 Course Outline Intro. to the design of Web and document databases, analysis, and applications Data mining: find most popular packages signature files, signature trees, signature tree construction and search, SPD-trees, SPD-tree construction and search (SPD – Single Package Design) Evaluation of extended reachability queries Regular expressions, non-deterministic finite automata (NDFA), deterministic finite automata (DFA), simple paths, intersection graphs, restricted regular expression, general query evaluation algorithm. (A. O. Mendelzon, and P. T. Wood, Finding Regular Paths in Graph Databases, SIAM J. Comput. Vol. 24, No. 6, pp. 1235- 1258, Dec. 1995)
Sept. 20146 Reference books: Database Systems (the complete book), 2nd Ed. by Carcia-Molina, Ullman, Widom, Pearson Prentice Hall, 2009. Fundamentals of Database Systems, 5th edition, Elmasri, Navathe, Addison-Wesley, Introduction to Algorithms, 2nd Ed. by Cormen, Leiserson, Rivest, & Stein (CLRS), McGraw Hill, 2002. Lecture slides online For evaluation of tree pattern queries: - N. Bruno, N. Koudas, and D. Srivastava, Holistic Twig Joins: Optimal XML Pattern Matching, in Proc. SIGMOD Int. Conf. on Management of Data, Madison, Wisconsin, June 2002, pp. 310-321. - Y. Chen and L. Zou, Unordered tree matching: the evaluation of tree pattern queries, Int. J. Information Technology, Communications and Convergence, 2011.
Sept. 20147 Reference books: For evaluation of reachability queries - Warren, “A Modification of Warshall’s Algorithm for the Transitive Closure of Binary Relations,” Commun. ACM 18, 4 (April 1975), 218 - 220. -H. Wang, H. He, J. Yang, P.S. Yu, and J. X. Yu, Dual Labeling: Answering Graph Reachability Queries in Constant time, in Proc. of Int. Conf. on Data Engineering, Atlanta, USA, April -8 2006. -H. Yildirim, V. Chaoji, and M.J. Zaki, GRAIL: Scalable Reachability Index for Large Graphs, in Proc. VLDB Endowment, 3(1), 2010, pp. 276-284. -Y. Chen and Y.B. Chen, Decomposing DAGs into spanning trees: A new way to compress transitive closures, in Proc. 27 th Int. Conf. on Data Engineering (ICDE 2011), IEEE, April 2011, pp. 1007-1018. -Chen, Yangjun: General Spanning Trees and Reachability Query Evaluation, in Proc. Canadian Conference on Computer Science and Software Engineering (C 3 S 2 E’09), Montreal, Canada, 2009, IEEE, pp. 243 – 252.
Sept. 20148 Reference books: For evaluation of regular expressions -A. O. Mendelzon, and P. T. Wood, Finding Regular Paths in Graph Databases, SIAM J. Comput. Vol. 24, No. 6, pp. 1235-1258, Dec. 1995)
Sept. 20149 Course Roadmap Database basics Indexes: B + -tree, Hashing, R-tree, kd-trees, Quad-trees, … Semistructured data model Programming languages for XML Databases over Internet Evaluation of tree pattern queries - Tree searching and graph searching - Unordered tree matching - Ordered tree matching - XB-trees
Sept. 201410 Course Roadmap Reachability query evaluation - Transitive closure and reachability checking - Matrix multiplication, Warren’s algorithm - Methods based on tree encoding - Methods based on graph deduction and decomposition Finding most popular packages - Signature files - Signature trees - SPD-trees
Sept. 201412 Database Basics Basic method for designing relational databases - Enhanced entity-relationship diagram - Rules for mapping EERD to relational schema - Relational data model, SQL, database application: JDBC Normalization theory - 1 st, 2 nd, 3 rd, and 4 th normal forms - Boyce-Codd normal form Hashing, B + -tree and R-tree - Hashing and linear hashing - B+-tree, R-tree construction and maintenance - Kd-trees, Quad-trees, Bit-map, inverted files
Sept. 201413 XML Document Databases Semistructured-data model Programming languages for XML Databases over internet Goals -Data storage in document databases -Manipulation of data in document databases -Data transfer over the Internet
Sept. 201414 Evaluation of Tree Pattern Queries Tree searching and graph searching Unordered tree matching Ordered tree matching XB-trees Goals -Evaluation of queries against document databases -Indexing data to speed up information retrieval
Sept. 201415 FINDING MOST POPULAR PACKAGES Signature files Signature trees, signature tree construction and search SPD-trees, SPD-tree construction and search Goals -A kind of data mining to find customer patterns to enlarge sales -Binary tree search with pruning
Sept. 201416 Transitive closures and reachability checking - matrix multiplication - Warren’ algorithm Method based on tree encoding - Tree encoding - Extension of tree encoding to DAGs Method based on graph deduction and decomposition Goals –Efficient algorithm for checking reachability of nodes –Basic operation used in many applications, such as web navigation, graph databases, biological databases Reachability Query Evaluation
Sept. 201417 Evaluation of Extended Reachability Queries Regular expressions, NDFA, DFA Intersection graphs Restricted regular expressions General query evaluation algorithm Goals –Evaluation of queries in graph databases –Get information from the Internet
Sept. 201418 Implementation of an algorithm for constructing an XB-tree Implementation of an algorithm for decomposing a DAG into a minimized set of chains Implementation of an algorithm for evaluating unordered tree pattern queries Implementing an algorithm for evaluating ordered tree pattern queriesProject
Sept. 201419 Important dates: Wednesday, Sept 03, 2014First class Wednesday, Oct. 22, 2014 Midterm examination Oct. 23, 2014 Final date to withdraw without academic penalty from a course that begins in Sept. and ends in Dec. of the 2014 Fall term Nov. 26, 2014Last class Final examination no (replaced by projects)
Sept. 201420 Course Evaluation: 3 assignments 24% 1 midterm examination 26% 1 project (or final exam.) 50% All assignments are handed in at class on the due date. All works must be prepared using a word processor and placed in a folder. Late assignments are accepted (up to 1 day late) and receive a 25% penalty.
Sept. 201421 Academic dishonesty: Academic dishonesty is a very serious offense and will be dealt with in accordance with the University's discipline bylaw. Be sure that you have read and understood Regulations and Policies, #8 in the 2014-2015 UW Calendar.